Cross-domain secure computation
From MaRDI portal
Recommendations
- Secure computation on the web: computing without simultaneous interaction
- Impossibility results for static input secure computation
- Secure Computation Without Authentication
- Bounded-concurrent secure two-party computation without setup assumptions
- A minimal model for secure computation (extended abstract)
Cited in
(3)
This page was built for publication: Cross-domain secure computation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5402998)